shauntdergrigorian / splunkqueries
A list of Splunk queries that I've collected and used over time.
☆74Updated 4 years ago
Alternatives and similar repositories for splunkqueries:
Users that are interested in splunkqueries are comparing it to the libraries listed below
- SentinelOne STAR Rules☆52Updated last year
- Repository of SentinelOne Deep Visibility queries.☆120Updated 3 years ago
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- SPL cheatsheet for Splunk.☆20Updated 2 years ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆108Updated this week
- MISP to Sentinel integration☆62Updated last month
- Tools for simulating threats☆180Updated last year
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆21Updated this week
- ☆53Updated last year
- ☆42Updated 2 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆195Updated 4 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆184Updated 4 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆75Updated 2 years ago
- This repository contains Community and Field contributed content for LogScale☆177Updated this week
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆170Updated this week
- Real-time Response scripts and schema☆107Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆213Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆237Updated last month
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆52Updated 5 years ago
- A guide to using Azure Data Explorer and KQL for DFIR☆98Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆113Updated 3 months ago
- A collection of various SIEM rules relating to malware family groups.☆64Updated 7 months ago
- Security Scripts and Sources for daily usage.☆51Updated this week
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆247Updated 3 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆52Updated last year
- InsightVM helpful SQL queries☆62Updated last month
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆104Updated last month
- ☆91Updated 2 years ago